Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Physical System
biblio
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
blueborne Attack defending
bluetooth security
Cyber Physical System
working methods
working mechanism
peer-reviewed researches
data switching
Bluetooth Security Framework
Bluetooth protocols
Bluetooth application-layer packet-filtering
Protocols
BlueBorne Attack
Bluetooth
cyber physical systems
Human behavior
resilience
Resiliency
composability
pubcrawl
telecommunication security
biblio
LBM: A Security Framework for Peripherals within the Linux Kernel
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
powerful filtering functionality
Linux (e)BPF modules
Linux kernel
Linux-Kernel
malicious peripherals
malicious USB
NFC devices
operating systems (computers)
OS software stacks
Peripheral
peripheral attack surface
Linux
Protocols
pubcrawl
resilience
Resiliency
security
Smartphones
standardized communication protocols
Universal Serial Bus
USB
cyber physical systems
Metrics
Predictive Metrics
Bluetooth
bluetooth security
composability
computer network security
computer peripheral equipment
Computer peripherals
Cyber Physical System
Linux Operating System Security
eBPF
eBPF packet filtering mechanism
external GPU
filtering theory
general security framework
host operating system
Human behavior
Kernel
LBM framework
biblio
Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
low power consumption
WMN
wireless mesh networks
Wireless Mesh Network Security
wireless
telecommunication security
security
Resiliency
resilience
pubcrawl
Protocols
mesh support capability
MESH network
ad-hoc networking technologies
Human behavior
cyber physical systems
Cyber Physical System
composability
Communication networks
bluetooth security
Bluetooth low energy mesh network technology
bluetooth low energy
Bluetooth
BLE security protocols
BLE mesh network security mechanisms
BLE
biblio
Analyzing the Security of Bluetooth Low Energy
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
IoT
bluetooth security
Cyber Physical System
Ubertooth
malicious actors
bluetooth low energy
BLE devices
Bluetooth
Internet of Things devices
security standards
cyber physical systems
Software
sensitive information
encryption
Human behavior
resilience
Resiliency
composability
pubcrawl
standards
Hardware
Protocols
security of data
security
Internet of Things
biblio
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs
Submitted by grigby1 on Fri, 09/04/2020 - 4:25pm
malicious actor
covert
data
Data Exfiltration
exfiltration
free-space optical communication
highly secured network
home networks
Image color analysis
insecure IoT
IoT
Chromium
professional networks
security measures
security standard
sensitive environments
smart bulb
strict security policies
unprecedented threats
web bluetooth api
Cyber Physical System
bluetooth security
sensitive information
Internet of Things
security
computer network security
invasive software
pubcrawl
composability
Resiliency
resilience
Human behavior
IoT devices
Cryptography
Software
cyber physical systems
Payloads
Browsers
botnets
air gapped network
Bluetooth
Bluetooth IoT
Bluetooth smart bulb
biblio
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
Submitted by aekwall on Mon, 08/24/2020 - 1:36pm
power engineering computing
cyberattack
cyberattack vectors
Cybercrime
cybercrime phenomenon
DAG method
inference mechanisms
invasive software
Knowledge representation
cyber-physical systems
probabilistic inference
pubcrawl
Resiliency
smart power grids
supply chains
threat probability
uncertainty
CPS domain
Scalability
Artificial Intelligence
Bayes methods
Bayesian belief network
Bayesian belief networks
belief networks
composability
Computer crime
Chained Attacks
CSC domain
Cyber Attacks
Cyber Physical System
cyber physical systems
cyber security domain
cyber supply chain attacks detection
Cyber Supply Chain Threats
biblio
A cyber physical power system co-simulation platform
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
power engineering computing
Voltage control
Synchronization
smart power grids
simulations
simulation
Routing protocols
Resiliency
resilience
real-time systems
pubcrawl
power system stability
power system simulation
power system security
power system control
Power Grid
automatic voltage control
Metrics
information and communication technology
hardware-in-the-loop simulation function
Hardware-in-the-loop (HIL)
hardware-in-the loop simulation
denial-of-service attack
cyber-attack
Cyber Physical System (CPS)
Cyber Physical System
cyber physical power system co-simulation platform
CPS modeling
control engineering computing
composability
closed loop systems
AVC
biblio
Simulation Testing of Fault-Tolerant CPS Based on Hierarchical Adaptive Policies
Submitted by grigby1 on Thu, 07/16/2020 - 11:56am
resilience
inter-layer message transmission mechanism
message passing
Metrics
Nickel
node activity test mechanism
physical backup
pubcrawl
Redundancy
hierarchical model
Resiliency
resource allocation
safety-critical key infrastructures
simulation test
simulation testing
simulations
SPB-CPS simulation test efficiency
test resources
fault tolerance
adaptive allocation
collaborative simulation time sequence push strategy
composability
Computational modeling
Control Strategy
CPS modeling
Cyber Physical System
cyber-physical systems
Adaptation models
fault tolerance policies
fault tolerant computing
Fault tolerant systems
Fault-Tolerant CPS
fault-tolerant CPS simulation platform
Hardware
hardware redundancy technology physical backup
hierarchical adaptive policies
biblio
Detection and Compensation of Covert Service-Degrading Intrusions in Cyber Physical Systems through Intelligent Adaptive Control
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
networked control systems
feedback
feedback signals
ICs
Anomaly Detection
Identification
insecure networks
intelligent adaptive control
internet
Intrusion Detection
Metrics
Detectors
pubcrawl
resilience
Resiliency
service degradation.
simulations
Steady-state
system behavior
system operation
system/plant identification
covert attacks
classic controller
compensating controller
compensation framework
compensator
composability
computer network security
computer networks
control
control engineering computing
covert
adaptive control
covert service-degrading intrusions
CPS modeling
Cyber Physical System
cyber security
cyber-physical systems
DC motors
deception signal amplification attack
Degradation
detection algorithm
biblio
Cyber Risks Assessment For Intelligent And Non-Intelligent Attacks In Power System
Submitted by aekwall on Mon, 07/06/2020 - 10:19am
stochastic petri nets
Damage Assessment
transmission line protection systems
substation
power transmission protection
power system structure
power system components
Petrinet
nonintelligent attacks
intelligent attack
IEEE39 bus system
electrical network
cyber security risk assessment method
cyber physical performance
attacks
power supply
security of data
Cyber Physical System
smart power grid
power transmission lines
Stochastic processes
substation automation
cyber security
Petri nets
power system security
power engineering computing
probability
Cyber Attacks
smart power grids
Risk
pubcrawl
Resiliency
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »